Feeds

Nothing to sniff at: Cisco finishes $2.8bn gobble of Snort'ing guy's Sourcefire

Biggest security purchase since Intel wolfed down McAfee

The Essential Guide to IT Transformation

Intrusion prevention's a hot topic in the world of security, as reflected in the $2.8bn price tag Cisco has paid to complete the acquisition of network security specialists Sourcefire.

The purchase - which was announced in July - is the largest security firm purchase since Intel's $7.7bn acquisition of McAfee in 2010. And it's a huge personal payday for Marty Roesch, creator of the open-source intrusion protection system Snort. He took Snort's basic technology and built commercial code under the Sourcefire brand since 2001.

"I'd be lying if I said I wasn't sentimental. When I think back when I was in my spare bedroom writing Snort, I never imagined it would be foundational to building a great company followed by an acquisition by one of the largest technology companies in the world," Roesch said in a blog post.

It's the second time the company has tried to get bought out. Israeli firm Check Point tried to purchase the company in 2005 for $225m, but the deal was dropped after it looked as though the US government was going to block the deal on national security grounds. There have been no such problems for homegrown firm Cisco however.

"To truly protect against all possible attack vectors, our focus is to examine the nature of modern networked environments and devices and to defend them by deeply understanding and analyzing the mindset of the attackers," said Christopher Young, senior vice president of Cisco Security Group.

There are no changes planned at Sourcefire at the moment – the firm's headcount and headquarters will remain the same and it's business as usual, Roesch promised. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.